Proactive Security Measures: How to Prevent Malware Attacks
Total Page:16
File Type:pdf, Size:1020Kb
Proactive security measures: How to prevent malware attacks Proactive security measures: How to prevent malware attacks One constant that all IT departments can always count on is a new type of threat entering their industry. With Contents the current use of mobile devices, social media and cloud services, malware is finding new ways to enter and threaten New Malware threats companies in a completely different way. This expert E-Guide require new antimalware discusses how to proactively secure your enterprise and the protection strategy necessity to improve and update your antimalware strategy. Proactive security measures: How to prevent malware New Malware threats require new antimalware protection attacks strategy By Lisa Phifer How antivirus software works: Virus detection techniques While IT continues to fight increasingly clever attacks against on-site enterprise infrastructure, new malware is taking aim at lower-hanging fruit: under-secured smartphones, mobile applications, social media, and other cloud services. As workers make more extensive use of such perimeter-less platforms, they create rich targets that require new antimalware protection strategies to mitigate these multifaceted new malware threats. Enterprises can defend themselves by understanding these new malware vectors, enforcing application policies, implementing new device resident and cloud-based antimalware techniques, and leveraging other security tools. Following the money Far more than fame or hacktivism, the malware industry is driven by financial gain and drawn to low-cost, high-profit attacks. This has been repeatedly proven, as malware migrated from floppy to USB drives, email to Web, browser to PDF, abandoning old haunts to seek out more vulnerable monocultures. “As technology trends such as Web and mobile come to the forefront, that’s where malware refocuses,” says Intrepidus Group Principal Consultant Zach Lanier. “Mobile convergence creates an interesting opportunity: one device that delivers [non-stop] network, Web, media, and application access. Page 2 of 15 Sponsored by Proactive security measures: How to prevent malware attacks Because there are only so many players -- Apple, Google, the WebKit browser engine -- a single bug can be leveraged to attack millions of users.” Contents And criminals needn’t look far to find beefy targets. Google activates 700,000 New Malware threats new Android smartphones and tablets per day. According to Flurry Analytics, require new 6.8 million Apple (iOS) and Android devices were enabled on Christmas Day antimalware alone. Facebook now reaches over 800 million users, half-active on any protection strategy given day. Popular Web 2.0 sites like YouTube, Twitter, and WordPress average 450, 200, and 100 million visitors per day, respectively. Google Proactive security measures: How to Apps has 40 million accounts, including 4 million businesses. prevent malware attacks In fact, cloud services like Google Apps “are a very large data repository for a wide range of companies and people,” Cisco Senior Threat Researcher Mary How antivirus software works: Virus Landesman says. “Rather than trying to penetrate one [business] at a time, detection techniques cloud is an avenue of attack to penetrate many. Increased return on investment means making money with less effort – cloud attacks are a natural progression of that.” Looking for loopholes: Mobile malware and social media But size and popularity are not the only draws. Co-mingled personal and business use, real-time communication, bring-your-own consumerization, and little or no IT control combine to make any discovered vulnerabilities more readily exploitable. Lookout Principal Engineer Tim Wyatt has examined thousands of mobile applications from Apple’s AppStore, Google’s Android Market, and unofficial markets. “We’re still seeing the start-up phase of smartphone malware development. Attackers are experimenting with what they can do, inside and outside the enterprise. We haven’t yet seen massive self-replicating mobile malware, but we think that’s mostly because nobody has hit on a business model for untargeted attacks, beyond toll fraud,” he says. Symantec tracked mobile malware monetization, including premium-rate SMS trojans, tracking spyware, search engine poisoning, pay-per-install/click schemes, repackaged adware, and identity theft. According to Product Manager John Engels, “We used to see these for Symbian. When iOS Page 3 of 15 Sponsored by Proactive security measures: How to prevent malware attacks changed the landscape, Apple did a good job of building in [malware deterrents] such as sandboxing and AppStore review. Now Android is picking up where Symbian left off because it’s open, with alternative distribution Contents paths that are a recipe for more challenging malware.” New Malware threats require new Similar trends have been seen in malicious activity on social networks such antimalware as Facebook.“[Social media] malware tends to be user-focused: looking to protection strategy gain access to the user’s account or credentials,” Cisco’s Landesman says. “Today’s biggest enterprise threats don’t evolve from social networks, but at Proactive security measures: How to some point, those could morph into more targeted attacks.” prevent malware attacks For now, social media attacks tend to be untargeted. M86 Security Labs reports that Facebook scams surged during the first half of 2011 as attackers How antivirus software works: Virus searched for new ways to convince thousands to click on malicious links. detection techniques From “like-jacking” and “comment-jacking” to photo tagging and rogue applications, social engineering tricks snared users into pay-per-click or pay- per-install scams -- some leading to malware like the Koobface botnet Trojan. Facebook itself scans over a trillion clicks per day, blocking more than 200 million posts and messages carrying malicious links. Social media security risks For IT groups scrambling to stop malware on so many different fronts, deciding which threats to tackle can be a challenge. The best place to begin is by understanding emerging malware: targeted platforms, exploited vulnerabilities, and jeopardized business assets. “Recently, the biggest threats have not attacked computers -- they’ve attacked people,” says Symantec Security Response Director Kevin Haley. “We’re seeing [email] spam drop as attackers move to social media. Factors include shutdown of major botnets, growing ineffectiveness of spam, and natural migration to new vectors. Technology itself hasn’t changed that much; social engineering got better and toolkits made malware easier.” To date, social media malware has gotten the biggest bang by aiming at Facebook, Twitter, and YouTube. For example, Twitter’s brevity, anonymity, and real-time communication have fostered many hacks since 2007 -- some Page 4 of 15 Sponsored by Proactive security measures: How to prevent malware attacks involving account compromise, others malware dissemination. The two are intertwined, as legitimate and fraudulent top-followed accounts are used to phish thousands of victims. Shortened links, trend tags, and direct Contents messaging further increase the odds of following tweets to malware. New Malware threats require new As more businesses use Twitter to track industry news and communicate antimalware with customers, associated risk is growing. Not only do less than one-quarter protection strategy of enterprises block Twitter, but “companies cannot assume they don’t have a social networking presence,” Cisco’s Landesman says. “Nothing from a Proactive security measures: How to technology standpoint will solve this. You’re better off having practices in prevent malware place to determine what’s being said about your company and your tone and attacks action plan should a social networking crisis develop” Such practices might involve rapidly detecting and reporting tweets that reference your brand but How antivirus software works: Virus carry links leading to malware. detection techniques Facebook too has been plagued by phishing attacks. However, Facebook tends to be more personal, resulting in individual rather than business risk. But millenials expect to use Facebook and other social networks 24/7: Over half of surveyed college students said they would not even consider taking a job with an employer that banned access. Rampant password reuse and bring-your-own devices also mean credentials gleaned by Facebook malware could well play a role in corporate account break-ins. Workforce and malware mobility In fact, consumer mobile network attach rates are skyrocketing, driven largely by bring-your-own devices. According McAfee Senior Architect Igor Muttik, these unmanaged smartphones and tablets pose real enterprise risk. “Mobile devices are no longer just phones; they are now full computing devices. For example, they can record audio and video for blackmail or industrial espionage,” he says. “If somebody brings their device into the office, IT has no idea what’s on it. A blanket ban on personal devices isn’t going to succeed, so measurement of security is essential before allowing devices in or rejecting them.” Page 5 of 15 Sponsored by Proactive security measures: How to prevent malware attacks According to Muttik, market-leading devices -- iPhones, iPads, and their Android counterparts --have similar OS security models. The latest incarnations of each deter malware through sandboxing, code signing, Contents permissions, and hardware encryption. The biggest difference